Glossary- P Flashcards

1
Q

packet switched

A

A WAN technology where communications between endpoints takes place over a stream of packets that are routed through switches until they reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

parallel test

A

An actual test of disaster recovery (DR) and/or business continuity re- sponse plans. The purpose of a parallel test is to evaluate the ability of personnel to follow directives in emergency response plans—to actually set up the DR business pro- cessing or data processing capability. In a parallel test, personnel operate recovery sys- tems in parallel with production systems to compare the results between the two in order to determine the actual capabilities of recovery systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

password

A

An identifier that is created by a system manager or a user; a secret combina- tion of letters, numbers, and other symbols that is known only to the user who uses it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

password complexity

A

The characteristics required of user account passwords. For ex- ample, a password may not contain dictionary words and must contain uppercase let- ters, lowercase letters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

password length

A

The minimum and maximum number of characters permitted for a password that is associated with a computer account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

password reset

A

The process of changing a user account password and unlocking the user account so that the user’s use of the account may resume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

password reuse

A

The act of reusing a prior password for a user account. Some infor- mation systems can prevent the use of prior passwords in case any were compromised with or without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

password vaulting

A

The process of storing a password in a secure location for later use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

patch management

A

The process of identifying, analyzing, and applying patches (in-
cluding security patches) to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Payment Card Industry Data Security Standard (PCI-DSS)

A

A security standard whose objective is the protection of credit card numbers in storage, while processed, and while transmitted. The standard was developed by the Payment Card Industry, a consortium of credit card companies, including VISA, MasterCard, American Express, Discover, and JCB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

performance evaluation

A

A process where an employer evaluates the performance of each employee for the purpose of promotion, salary increase, bonus, or retention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

personal area network (PAN)

A

A network that is generally used by a single individual and is usually limited to about three meters in size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

personal digital assistant (PDA)

A

A mobile device that is similar to a smart phone in size and features, but which lacks the mobile phone component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

phishing

A

A social engineering attack on unsuspecting individuals where e-mail mes- sages that resemble official communications entice victims to visit imposter websites that contain malware or request credentials to sensitive or valuable assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

physical

A

Layer 1 of the OSI network model. See also OSI network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

physical control

A

Controls that employ physical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

physical network architecture

A

The part of network architecture concerned with the physical locations of network equipment and network media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

piggybacking

A

See tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

plain old telephone service (POTS)

A
Another name for the public-switched tele-
phone network (PSTN). See also public-switched telephone network (PSTN).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

plaintext

A

An original message, file, or stream of data that can be read by anyone who
has access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

point-to-point protocol (PPP)

A

A network protocol used to transport TCP/IP packets over point-to-point serial connections (usually RS-232 and dial-up connections).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

policy

A

A statement that specifies what must be done (or not done) in an organiza- tion. A policy usually defines who is responsible for monitoring and enforcing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

polymorphism

A

The different ways in which an object may behave, depending upon the data that is passed to it. See also object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

population

A

A complete set of entities, transactions, or events that are the subject of an audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Post Office Protocol (POP)

A

A TCP/IP application layer protocol that is used to re- trieve e-mail messages from an e-mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

power distribution unit (PDU)

A

A device that distributes electric power to a com- puter room or data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

pre-action

A

A fire sprinkler system used in areas with high-value contents such as data centers. A pre-action system is essentially a dry pipe system until a “preceding” event such as a smoke detector alarm occurs; at this time, the system is filled with water and essentially converts in real time to a wet pipe system. Then, if the ambient temperature at any of the sprinkler heads is high enough, those fuses break, releasing water to extin- guish the fire. See also fire sprinkler system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

pre-audit

A

An examination of business processes, controls, and records in anticipation of an upcoming audit.

29
Q

precision

A

A measure of how closely a sample represents the entire population.

30
Q

presentation

A

Layer 6 of the OSI network model. See also OSI network model.

31
Q

preventive action

A

An action that is initiated to prevent an undesired event or condition.

32
Q

preventive control

A

A control that is used to prevent unwanted events from happening.

33
Q

primary key

A

One of the fields in a table in a relational database management system (rDBMS) whose values are unique for each record (row). See also relational database management system, table, row, and field.

34
Q

print server

A

A server that is used to coordinate printing to shared printers.

35
Q

privacy

A

The protection of personal information from unauthorized disclosure, use, and distribution.

36
Q

privacy policy

A

A policy statement that defines how an organization will protect, man- age, and handle private information.

37
Q

privacy requirements

A

Formal statements that describe required privacy safeguards that a system must support.

38
Q

private address

A

An IP address that falls into one of the following ranges: 10.0.0.0– 10.255.255.255, 172.16.0.0–172.31.255.255, or 192.168.0.0–192.168.255.255. Pack- ets with a private address destination cannot be transported over the global Internet.

39
Q

probability analysis

A

The analysis of a threat and the probability of its realization.

40
Q

problem

A

An incident—often multiple incidents—that exhibits common symptoms
and whose root cause is not known.

41
Q

problem management

A

The IT function that analyzes chronic incidents and seeks to resolve them, and also enacts proactive measures in an effort to avoid problems. See also IT service management.

42
Q

procedure

A

A written sequence of instructions used to complete a task.

43
Q

process

A

A collection of one or more procedures used to perform a business function.
See also procedure.

44
Q

process

A

A logical container in an operating system in which a program executes.

45
Q

process isolation

A

A basic feature of an operating system that prevents one process from accessing the resources used by another process.

46
Q

processing controls

A

Controls that ensure the correct processing of information.

47
Q

program

A

An organization of many large, complex activities; it can be thought of as a
set of projects that work to fulfill one or more key business objectives or goals.

48
Q

program charter

A

A formal definition of the objectives of a program, its main time- lines, sources of funding, the names of its principal leaders and managers, and the busi- ness executive(s) who are sponsoring the program.

49
Q

program management

A

The management of a group of projects that exist to fulfill a business goal or objective.

50
Q

programmable read-only memory (PROM)

A

A form of permanent memory that can- not be modified.

51
Q

programming language

A

A vocabulary and set of rules used to construct a human- readable computer program.

52
Q

project

A

A coordinated and managed sequence of tasks that results in the realization of an objective or goal.

53
Q

project change management

A

The process of controlling a project plan and budget through formal reviews of changes.

54
Q

project evaluation and review technique (PERT)

A

A visual representation of a project plan that shows project tasks, timelines, and dependencies.

55
Q

project management

A

The activities that are used to control, measure, and manage the activities in a project.

56
Q

project management body of knowledge (PMBOK)

A

A project management guide that defines the essentials of project management.

57
Q

project plan

A

The chart of tasks in a project, which also includes start and completion dates, resources required, and dependencies and relationships between tasks.

58
Q

project planning

A

The activities that are related to the development and management of a project.

59
Q

project schedule

A

The chart of tasks in a project with their expected start and comple- tion dates.

60
Q

PRojects IN Controlled Environments 2 (PRINCE2)

A

A project management frame- work.

61
Q

proof of concept

A

A method for demonstrating the ability to build or implement complex systems through the use of simpler models.

62
Q

protocol analyzer

A

A device that is connected to a network in order to view network communications at a detailed level.

63
Q

protocol standard

A

A standard that specifies the protocols used by the IT organization.

64
Q

prototyping

A

An alternative software development process where rapidly developed
application prototypes are developed with user input and continuous involvement.

65
Q

proxy server

A

A device or system used to control end-user access to Internet websites.

66
Q

public key cryptography

A

See asymmetric encryption.

67
Q

public key infrastructure

A

A centralized function that is used to store and publish public keys and other information.

68
Q

public-switched telephone network (PSTN)

A

The common carrier-switched tele- phone network used to carry voice telephone calls over landlines.